Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Jet2.com Limited
Shape, create or own cloud security strategy, policies, tools and services. Evaluate and shape responses to cloud alerts and events from security tools. Conduct threatmodelling and develop cloud security incident response plans. Provide security consultation as a cloud security SME in forums and to other teams. Provide More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Context
/Infrastructure background Extensive experience with GDPR and data protection, together with extensive knowledge of IS standards including ISO and NIST. Security assessment frameworks (threatmodelling, controls assessment, risk assessment) Ideally hold a relevant qualifications; CISSP, CISM or similar. Understanding of TOGAF methodology would be beneficial, although is More ❯
You'll be responsible for the DevSecOps engagement plan, to educate engineers by scaling up security champions, implementing a framework for security best practice, threatmodelling, and input into design reviews. Automation will be a top priority, ensuring there are valuable feedback loops for engineers during the deployment More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
Lockheed Martin
a collaborative team environment with other DevSecOps engineers and other program development and deployment teams. Provide security in DevSecOps, up-to-date knowledge of threat modeling, risk assessment techniques, code reviews, current best practices and the latest cybersecurity threats Choose and deploy the appropriate automated application security testing tools More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
OSAAVA Services
teams by embedding security into iterative solution delivery. Collaborate with DevOps and platform teams to integrate network security controls into CI/CD pipelines. • Threat Modeling & Risk Management: Perform security threat modeling for network systems. Contribute to security assessments, mitigation plans, and incident response strategies. • Secure Connectivity Solutions More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
OSAAVA Services
teams by embedding security into iterative solution delivery. Collaborate with DevOps and platform teams to integrate network security controls into CI/CD pipelines. • Threat Modeling & Risk Management: Perform security threat modeling for network systems. Contribute to security assessments, mitigation plans, and incident response strategies. • Secure Connectivity Solutions More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Summer Browning Associates
Experience of IT Security documentation (policies, standards, processes, procedures and patterns). Experience of IT Health Check and Vulnerability Assessments Experience of risk and threat modelling. Qualifications: accreditation/assurances CISM/XCCP/ISO More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
SUMMER-BROWNING ASSOCIATES LIMITED
Experience of IT Security documentation (policies, standards, processes, procedures and patterns). Experience of IT Health Check and Vulnerability Assessments Experience of risk and threat modelling. Qualifications: accreditation/assurances CISM/XCCP/ISO More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Carrington Recruitment Solutions Limited
Experience with cloud computing platforms such as Microsoft Azure A strong understanding of software development methodologies and practices Ability to Rapid Risk Assessment and Threat Modeling Other technical skills required: Azure Security Monitoring including Application Insights, and SIEM Excellent communication skills to guarantee stakeholder alignment and successful outcomes at More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Carrington Recruitment Solutions Limited
Experience with cloud computing platforms such as Microsoft Azure A strong understanding of software development methodologies and practices Ability to Rapid Risk Assessment and Threat Modeling Other technical skills required: Azure Security Monitoring including Application Insights, and SIEM Excellent communication skills to guarantee stakeholder alignment and successful outcomes at More ❯
in the face of ambiguity. Nice to Have Traits for Cloud Platform Cloud Security : Experience with building and delivering secure infrastructure and software, including threat modeling, complex IAM and resource management. Data governance, data privacy: GDPR, CCPA compliance, encryption standards, and implementing secure data lifecycle management practices within cloud More ❯
London, England, United Kingdom Hybrid / WFH Options
Anson McCade
using architecture methodologies (TOGAF, SABSA). Familiarity with government security classification policy and defence cyber requirements (JSP 440, Secure by Design). Expertise in threat/risk modelling, network security, encryption, authentication, and access control. Skilled in configuring security technologies like firewalls, IDS/IPS, SIEM, and vulnerability More ❯
Investment Management 💰 £££ Competitive Day Rate | Contract with Perm Option 📍 Central London | Hybrid Working ✅ Senior-level Cyber Security Engineer ✅ Core security disciplines – infrastructure, cloud, identity, threat, risk ✅ Initial contract with an option to convert to permanent employment You'll be working for a well-established investment management firm as a … will directly impact infrastructure, cloud, data, and application integrity. The Role: Deliver security engineering across network, cloud, and endpoint infrastructure Support detection, response, and threatmodelling Help mature identity & access management controls Lead on vulnerability remediation and risk assessments Act as SME in cross-functional projects involving security … tooling & design What You Need: ✔ Proven experience in senior security engineering roles ✔ Strong across core cyber disciplines – infrastructure, cloud, IAM, threat detection, risk ✔ Ability to balance strategic thinking with hands-on delivery ✔ Comfortable in a regulated environment (finance ideal but not essential) ✔ Confident communicator, able to advise both tech More ❯
london, south east england, united kingdom Hybrid / WFH Options
Harrington Starr
Investment Management 💰 £££ Competitive Day Rate | Contract with Perm Option 📍 Central London | Hybrid Working ✅ Senior-level Cyber Security Engineer ✅ Core security disciplines – infrastructure, cloud, identity, threat, risk ✅ Initial contract with an option to convert to permanent employment You'll be working for a well-established investment management firm as a … will directly impact infrastructure, cloud, data, and application integrity. The Role: Deliver security engineering across network, cloud, and endpoint infrastructure Support detection, response, and threatmodelling Help mature identity & access management controls Lead on vulnerability remediation and risk assessments Act as SME in cross-functional projects involving security … tooling & design What You Need: ✔ Proven experience in senior security engineering roles ✔ Strong across core cyber disciplines – infrastructure, cloud, IAM, threat detection, risk ✔ Ability to balance strategic thinking with hands-on delivery ✔ Comfortable in a regulated environment (finance ideal but not essential) ✔ Confident communicator, able to advise both tech More ❯
Dundee, Angus, United Kingdom Hybrid / WFH Options
DC Thomson
in a non-technical way Conduct security assessments of customer environments and design security architectures that address identified vulnerabilities and risks Develop and implement threat models to identify potential security threats and design mitigation strategies Oversee the implementation of security solutions, including firewalls, intrusion detection/prevention systems, security … and implementation Support customers and prospects with guidance into investment in security controls aligned to business objectives and knowing how to prioritise based on threat likelihood and impact Provide guidance and mentorship to junior security team members Qualifications and Experience: Proven/demonstrable experience in a cybersecurity presales or More ❯
risk and vulnerabilities from cyber-attacks by developing a security road-map tailored to your unique needs. We help organisations improve processes such as threat management by building an identity management programme, and establishing prevention, detection and response capabilities to cyber-attacks. Responsibilities: Ability to research, articulate, pitch complex … technical design of systems and services. Broad range of cyber and information security skills, knowledge and experience. Expert knowledge of identifying, developing and communicating threat modelling. Demonstrably experienced in working as an effective member of a multi-disciplinary team. Excellent stakeholder management, presentation and communication skills. Pro-active approach More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Sycurio
are the thought leader on all matters within the security and compliance domain such that the company remains secure against the ever-changing security threat and compliance landscape. Information Security Strategy Create and maintain the Company's strategy, ensuring alignment to the Company's strategy and business goals. Work … and propose remediation and mitigation plans and solutions. Responsible for the Company's information security capability, ensuring it remains secure against an ever-changing threat landscape. Operational Input Contribute to design and architectural decisions and improve the approach to the Company's threat modelling. Lead on information security … incidents and work directly with internal teams and external parties on containment and mitigation activities. Execute threat simulations. Assess emerging and potential security threats and act proactively to mitigate relevant threats. End-to-end vulnerability management. Manage the security toolset. Act as the security "face" of Sycurio to its More ❯
CodePipeline, Spinnaker, and Github Actions Have worked with log collection frameworks; preferably NewRelic, ELK, and Cloudwatch Experience with Terraform or Cloudformation Solid understanding of threat modeling and secure system architecture Experience with high performance networking, application load balancers, and VPC setup Experienced in Linux and shell scripting; Python and More ❯
CodePipeline, Spinnaker, and Github Actions Have worked with log collection frameworks; preferably NewRelic, ELK, and Cloudwatch Experience with Terraform or Cloudformation Solid understanding of threat modeling and secure system architecture Experience with high performance networking, application load balancers, and VPC setup Experienced in Linux and shell scripting; Python and More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
RTX
Defense System (MDS) sensors. The team is involved in various areas such as warfighter education, Wargames and Exercises, radar analysis, capability deployment, operational support, threat modeling, radar educational videos, etc. This position works on-site at the Missile Defense Agency/Sensors Warfighter Support (MDA/SNW) organization at More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
RTX
Defense System (MDS) sensors. The team is involved in various areas such as warfighter education, Wargames and Exercises, radar analysis, capability deployment, operational support, threat modeling, radar educational videos, etc. This position works on-site at the Missile Defense Agency/Sensors Warfighter Support (MDA/SNW) organization at More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
RTX
Defense System (MDS) sensors. The team is involved in various areas such as warfighter education, Wargames and Exercises, radar analysis, capability deployment, operational support, threat modeling, radar educational videos, etc. This position works on-site at the Missile Defense Agency/Sensors Warfighter Support (MDA/SNW) organization at More ❯
watchTowr's alignment to numerous industry standards, including ISO27001 and SOC2 Type 2, while going steps further where relevant due to watchTowr's unique threat model. You will oversee security monitoring, threat analysis, threat hunting, penetration testing, and vulnerability management to align cyber risk management with the More ❯